xff_referer
拦截数据包添加:X-Forwarded-For: 123.123.123.123
添加:Referer: https://www.google.com
baby_web
提示:想想初始页面是哪个
查看/index.php
simple_js
尝试万能密码,没有成功,在源码中找到如下:
将pass=“70,65,85,88,32,80,65,83,83,87,79,82,68,32,72,65,72,65”转化为ASCII码结果为:FAUX PASSWORD HAHA
将dechiffre(“\x35\x35\x2c\x35\x36\x2c\x35\x34\x2c\x37\x39\x2c\x31\x31\x35\x2c\x36\x39\x2c\x31\x31\x34\x2c\x31\x31\x36\x2c\x31\x30\x37\x2c\x34\x39\x2c\x35\x30”)\x换成%,再进行URL解码结果为:55,56,54,79,115,69,114,116,107,49,50
再转化为ASCII码:786OsErtk12
flag就是:Cyberpeace{786OsErtk12}
PHP2
访问/index.phps
将admin进行加密然后带到url后面:?id=%2561%2564%256d%2569%256e
ics-06
报表中心可以打开
抓包测试一下,2333不一样
id=2333就可以得到flag